Repository: ambari
Updated Branches:
  refs/heads/branch-2.4 70b20b20b -> ceba590c7


AMBARI-18019. Referring component level identity is not working for 
ranger-atlas-plugin(mugdha)


Project: http://git-wip-us.apache.org/repos/asf/ambari/repo
Commit: http://git-wip-us.apache.org/repos/asf/ambari/commit/ceba590c
Tree: http://git-wip-us.apache.org/repos/asf/ambari/tree/ceba590c
Diff: http://git-wip-us.apache.org/repos/asf/ambari/diff/ceba590c

Branch: refs/heads/branch-2.4
Commit: ceba590c71a72f89c8da0d973ac660a9b42ec058
Parents: 70b20b2
Author: Mugdha Varadkar <mug...@apache.org>
Authored: Thu Aug 4 23:57:01 2016 +0530
Committer: Mugdha Varadkar <mug...@apache.org>
Committed: Fri Aug 5 15:54:05 2016 +0530

----------------------------------------------------------------------
 .../ATLAS/0.7.0.2.5/kerberos.json               | 23 +++++++++++++++++++-
 .../RANGER/0.4.0/package/scripts/params.py      | 10 +++++----
 2 files changed, 28 insertions(+), 5 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/ambari/blob/ceba590c/ambari-server/src/main/resources/common-services/ATLAS/0.7.0.2.5/kerberos.json
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/resources/common-services/ATLAS/0.7.0.2.5/kerberos.json
 
b/ambari-server/src/main/resources/common-services/ATLAS/0.7.0.2.5/kerberos.json
index 2be4b7d..a9da650 100644
--- 
a/ambari-server/src/main/resources/common-services/ATLAS/0.7.0.2.5/kerberos.json
+++ 
b/ambari-server/src/main/resources/common-services/ATLAS/0.7.0.2.5/kerberos.json
@@ -15,6 +15,16 @@
             "atlas.jaas.KafkaClient.option.serviceName": 
"${kafka-env/kafka_user}",
             "atlas.solr.kerberos.enable": "true"
           }
+        },
+        {
+          "ranger-atlas-audit": {
+            "xasecure.audit.jaas.Client.loginModuleName": 
"com.sun.security.auth.module.Krb5LoginModule",
+            "xasecure.audit.jaas.Client.loginModuleControlFlag": "required",
+            "xasecure.audit.jaas.Client.option.useKeyTab": "true",
+            "xasecure.audit.jaas.Client.option.storeKey": "false",
+            "xasecure.audit.jaas.Client.option.serviceName": "solr",
+            "xasecure.audit.destination.solr.force.use.inmemory.jaas.config": 
"true"
+          }
         }
       ],
       "auth_to_local_properties" : [
@@ -46,7 +56,8 @@
               }
             },
             {
-              "name": "/ATLAS/ATLAS_SERVER/atlas",
+              "name": "atlas_auth",
+              "reference": "/ATLAS/ATLAS_SERVER/atlas",
               "principal": {
                 "configuration": 
"application-properties/atlas.authentication.principal"
               },
@@ -63,6 +74,16 @@
               "keytab": {
                 "configuration": 
"application-properties/atlas.authentication.method.kerberos.keytab"
               }
+            },
+            {
+              "name": "ranger_atlas_audit",
+              "reference": "/ATLAS/ATLAS_SERVER/atlas",
+              "principal": {
+                "configuration": 
"ranger-atlas-audit/xasecure.audit.jaas.Client.option.principal"
+              },
+              "keytab": {
+                "configuration": 
"ranger-atlas-audit/xasecure.audit.jaas.Client.option.keyTab"
+              }
             }
           ]
         }

http://git-wip-us.apache.org/repos/asf/ambari/blob/ceba590c/ambari-server/src/main/resources/common-services/RANGER/0.4.0/package/scripts/params.py
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/resources/common-services/RANGER/0.4.0/package/scripts/params.py
 
b/ambari-server/src/main/resources/common-services/RANGER/0.4.0/package/scripts/params.py
index 43c767d..e63627d 100644
--- 
a/ambari-server/src/main/resources/common-services/RANGER/0.4.0/package/scripts/params.py
+++ 
b/ambari-server/src/main/resources/common-services/RANGER/0.4.0/package/scripts/params.py
@@ -140,14 +140,14 @@ ranger_external_url = 
config['configurations']['admin-properties']['policymgr_ex
 if ranger_external_url.endswith('/'):
   ranger_external_url = ranger_external_url.rstrip('/')
 ranger_db_name = config['configurations']['admin-properties']['db_name']
-ranger_auditdb_name = 
config['configurations']['admin-properties']['audit_db_name']
+ranger_auditdb_name = 
default('/configurations/admin-properties/audit_db_name', 'ranger_audits')
 
 sql_command_invoker = 
config['configurations']['admin-properties']['SQL_COMMAND_INVOKER']
 db_root_user = config['configurations']['admin-properties']['db_root_user']
 db_root_password = 
unicode(config['configurations']['admin-properties']['db_root_password'])
 db_host =  config['configurations']['admin-properties']['db_host']
 ranger_db_user = config['configurations']['admin-properties']['db_user']
-ranger_audit_db_user = 
config['configurations']['admin-properties']['audit_db_user']
+ranger_audit_db_user = 
default('/configurations/admin-properties/audit_db_user', 'rangerlogger')
 ranger_db_password = 
unicode(config['configurations']['admin-properties']['db_password'])
 
 #ranger-env properties
@@ -214,8 +214,10 @@ ranger_credential_provider_path = 
config["configurations"]["ranger-admin-site"][
 ranger_jpa_jdbc_credential_alias = 
config["configurations"]["ranger-admin-site"]["ranger.jpa.jdbc.credential.alias"]
 ranger_ambari_db_password = 
unicode(config["configurations"]["admin-properties"]["db_password"])
 
-ranger_jpa_audit_jdbc_credential_alias = 
config["configurations"]["ranger-admin-site"]["ranger.jpa.audit.jdbc.credential.alias"]
 if stack_supports_ranger_audit_db else None
-ranger_ambari_audit_db_password = 
unicode(config["configurations"]["admin-properties"]["audit_db_password"]) if 
stack_supports_ranger_audit_db else None
+ranger_jpa_audit_jdbc_credential_alias = 
default('/configurations/ranger-admin-site/ranger.jpa.audit.jdbc.credential.alias',
 'rangeraudit')
+ranger_ambari_audit_db_password = ''
+if not 
is_empty(config["configurations"]["admin-properties"]["audit_db_password"]) and 
stack_supports_ranger_audit_db:
+  ranger_ambari_audit_db_password = 
unicode(config["configurations"]["admin-properties"]["audit_db_password"])
 
 ugsync_jceks_path = 
config["configurations"]["ranger-ugsync-site"]["ranger.usersync.credstore.filename"]
 ugsync_cred_lib = os.path.join(usersync_home,"lib","*")

Reply via email to